- Architecting the Industrial Internet
- Shyam Nath Robert Stackowiak Carla Romano
- 119字
- 2021-07-02 23:59:26
Security considerations for the functional viewpoint
Following are some of the security consideration for the functional viewpoint:
- Security audit: To collect, store, and analyze security-related information.
- Identity verification: In communications, it protects the integrity of communications within the IIoT system.
- Cryptographic support: This involves software and hardware for encryption and decryption.
- Data protection and privacy: This protects sensitive and personal information, both at rest and while in transit. Data protection requirements are defined by a security policy, and should be in keeping with organizational and regulatory requirements.
- Authentication and identity management: This ensures users only have access to the functions and data for which they are authorized.
- Physical protection: This enforces security policies to prevent tampering and unauthorized observation.
推薦閱讀
- Java程序設計與開發
- Mastering ServiceStack
- Learning RxJava
- Java 9 Programming Blueprints
- 數據結構簡明教程(第2版)微課版
- Learning Apache Kafka(Second Edition)
- INSTANT Sinatra Starter
- ServiceNow:Building Powerful Workflows
- Getting Started with React Native
- 詳解MATLAB圖形繪制技術
- Illustrator CC平面設計實戰從入門到精通(視頻自學全彩版)
- 小程序從0到1:微信全棧工程師一本通
- Akka入門與實踐
- 精通Spring:Java Web開發與Spring Boot高級功能
- DB2SQL性能調優秘笈